Switches Flashcards
1
Q
What types of attacks are Switches vulnerable to?
A
MAC Flooding
MAC Spoofing
Physical Tampering
2
Q
What is MAC Flooding?
A
An attempt to overwhelm the limited switch memory that is set aside to store the MAC addresses for each port.
Note: If the switch gets flooded, it can “fail-open” and start sending information out to every port.
3
Q
What is MAC Spoofing?
A
This occurs when an attacker masks their own MAC address to pretend they are another MAC address.
Note: MAC spoofing is often combined with ARP spoofing attacks.
4
Q
What is Physical Tampering?
A
The attacker gains physical access to the switch and can do a number of things to it.
5
Q
What layer of the OSI Model is the switch?
A
Layer 2